Secure entry system with radio communications
First Claim
1. A method of operating a secure entry system, the system including a lock that controls access to a secure area, the system further including a central station, the method comprising the steps;
- establishing communication between the central station and a user remote from the central station;
identifying to the central station the lock to which the user seeks access, said identifying not requiring the user be in proximity with the lock;
verifying access qualifications of the user to the central station;
transmitting to the lock a radio authorizing signal to authorize the user to access the area secured by the lock;
identifying the presence of the user at the lock;
operating a mechanism associated with the lock to aid in entry to the area secured by the lock;
logging access data relating to operations of the lock mechanism in the memory in the lock; and
relaying said logged access data from the lock to a remote location via radio transmission.
6 Assignments
0 Petitions
Accused Products
Abstract
A secure entry system makes use of radio transmissions to communicate with locks, keys, and related components throughout the system. The radio transmissions can be made using a paging system, a cellular telephone system, or any other RF carrier. Some embodiments employ a cellular telephone in lieu of an electronic key. Others integrate a paging receiver within an electronic key to provide a unit with dual functionality. The system is illustrated with reference to exemplary applications in the industrial site security, real estate lockbox, and transportation fields.
418 Citations
31 Claims
-
1. A method of operating a secure entry system, the system including a lock that controls access to a secure area, the system further including a central station, the method comprising the steps;
-
establishing communication between the central station and a user remote from the central station; identifying to the central station the lock to which the user seeks access, said identifying not requiring the user be in proximity with the lock; verifying access qualifications of the user to the central station; transmitting to the lock a radio authorizing signal to authorize the user to access the area secured by the lock; identifying the presence of the user at the lock; operating a mechanism associated with the lock to aid in entry to the area secured by the lock; logging access data relating to operations of the lock mechanism in the memory in the lock; and relaying said logged access data from the lock to a remote location via radio transmission. - View Dependent Claims (2)
-
-
3. A method of operating a secure entry system, the system including a lock that controls access to a secure area, the system further including a central station, the method comprising the steps;
-
establishing communication between the central station and a user remote from the central station; identifying to the central station the lock to which the user seeks access, said identifying not requiring the user be in proximity with the lock; verifying access qualifications of the user to the central station; transmitting to the lock a radio authorizing signal to authorize the user to access the area secured by the lock; identifying the presence of the user at the lock; operating a mechanism associated with the lock to aid in entry to the area secured by the lock; and wherein the lock is normally powered from an internal battery, rather than from an external power source.
-
-
4. A method of operating a secure entry system, the system including a lock that controls access to a secure area, the system further including a central station, the method comprising the steps;
-
establishing communication between the central station and a user remote from the central station; identifying to the central station the lock to which the user seeks access, said identifying not requiring the user be in proximity with the lock; verifying access qualifications of the user to the central station; transmitting to the lock a radio authorizing signal to authorize the user to access the area secured by the lock; identifying the presence of the user at the lock by operating a keypad on a handheld access device coupled to but distinct from the lock; and operating a mechanism associated with the lock to aid in entry to the area secured by the lock.
-
-
5. A method of operating a secure entry system, the system including a lock that controls access to a secure area, the system further including a central station, the method comprising the steps;
-
establishing communication between the central station and a user remote from the central station; identifying to the central station the lock to which the user seeks access, said identifying not requiring the user be in proximity with the lock by providing tone data to identify one of several locks; verifying access qualifications of the user to the central station; transmitting to the lock a radio authorizing signal to authorize the user to access the area secured by the lock; identifying the presence of the user at the lock by providing tone data to identify the user; and operating a mechanism associated with the lock to aid in entry to the area secured by the lock.
-
-
6. A method of operating a secure entry system, the system including a lock that controls access to a secure area, the system further including a key and a central station, the method comprising the steps:
-
establishing communication between the central station and a user remote from the central station; identifying to the central station the lock to which the user seeks access; verifying access qualifications of the user to the central station; transmitting to the key a radio enabling signal so as to enable the key to access the lock; and using the key to operate a mechanism associated with the lock to aid in entry to the area secured by the lock. - View Dependent Claims (7, 8, 9, 10, 11, 12, 25, 27, 28, 29, 30, 31)
-
-
13. A method of operating a secure entry system, the secure entry system including an access control device that has a radio receiver, processing circuitry, and a lock mechanism associated therewith, the method comprising the steps:
-
operating a cellular telephone to make a radio broadcast, the radio broadcast including signal tones modulated thereon; receiving said broadcast including signal tones; providing data signals corresponding to the received signal tones to the processing circuitry associated with the access control device; operating the lock mechanism in response to said provided data signals; and storing data relating to the lock operation in a memory, the data indicating at least the date the lock was operated. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 26)
-
Specification